Amal authentication architectural model "3AM" : for secure information exchange

Dissertant

Umari, Ahmad Husayn

Thesis advisor

al-Umari, Husayn Yusuf
Qaddurah, Imad

Comitee Members

al-Jabir, Ahmad Awdah
al-Uqayli, Salih
al-Sarhan, Sami

University

Arab Academy for Financial and Banking Sciences

Faculty

The Faculty of Information Systems and Technology

University Country

Jordan

Degree

Ph.D.

Degree Date

2004

English Abstract

The key enabler to E-Government implementation is trust, and trust is built gradually between the communicating parties.

Trust was defined by different disciplines; the basis of employing trust in the cyberspace is the information technology security.

Existing trust model can benefit from additional security services to enable a more secure message exchange.

Currently, messages are not controlled; once sent it is impossible to revoke.

Therefore, this may cause un-secure working environment.

In addition, a communication exchange uses the same encryption technique for the duration of the session.

This gives higher probability for security vulnerabilities.

This work came to provide the suitable solution to E-Government implementations by enabling enhanced trust; via designing a new paradigm in authentication protocols, called Ama Authentication Architectural Model or 3AM.

The 3AM represents a new paradigm in the information security for many reasons, mainly, the 3AM allows message control mechanism after the message being sent, the 3AM authenticates messages as if it is a resource, the 3AM preserves message security and confidentiality by having message exchange directly between the sender and receiver without a third party, and the 3AM represents a new implementation of open crypto, the model is flexible, modular, could be used in many applications like E-Government, E-commerce, E-business mobile telephone systems, and other e-initiatives.

In addition, the 3AM overcomes cultural barriers of the E-government practices and provides mean of secure information exchange for all types of messages (i.e.

multi-media) in the working environment.

3AM modularity allows it be a plug and play model since it works with any existing security service.

Therefore, 3AM truly enhances the trust model by allowing the above benefits to any type of information exchange in cyberspace.

Main Subjects

Information Technology and Computer Science

Topics

No. of Pages

184

Table of Contents

Table of contents.

Abstract.

Chapter one : E-government as a catalyst in the information age.

Chapter two : Information technology security.

Chapter three : Authentication and identification.

Chapter four : E-government trust infrastructure.

Chapter five : Amal authentication architectural model (3AM).

Chapter six : Discussions and conclusions.

References.

American Psychological Association (APA)

Umari, Ahmad Husayn. (2004). Amal authentication architectural model "3AM" : for secure information exchange. (Doctoral dissertations Theses and Dissertations Master). Arab Academy for Financial and Banking Sciences, Jordan
https://search.emarefa.net/detail/BIM-304725

Modern Language Association (MLA)

Umari, Ahmad Husayn. Amal authentication architectural model "3AM" : for secure information exchange. (Doctoral dissertations Theses and Dissertations Master). Arab Academy for Financial and Banking Sciences. (2004).
https://search.emarefa.net/detail/BIM-304725

American Medical Association (AMA)

Umari, Ahmad Husayn. (2004). Amal authentication architectural model "3AM" : for secure information exchange. (Doctoral dissertations Theses and Dissertations Master). Arab Academy for Financial and Banking Sciences, Jordan
https://search.emarefa.net/detail/BIM-304725

Language

English

Data Type

Arab Theses

Record ID

BIM-304725